yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Panda Security Launches New Panda GateDefender Performa eSeries
- New line of integrated perimeter security appliances designed for mid-size and large companies

ORLANDO, Fla., Nov. 19, 2012 /PRNewswire/ -- Panda Security, The Cloud Security Company, today announced the launch of Panda GateDefender Performa eSeries, its new, unified perimeter security device that protects against all types of threats. Panda Security's new appliance enables mid-size and large companies (50 users or more) to protect their corporate network and increase their productivity.

The solution is available in three different versions: compatible with virtualization engines, software only, and five different hardware models designed for organizations of every size. In addition, its new Panda Perimeter Management Console allows centralized and secure management and configuration of all appliances on the network from a single location, accessible from the cloud at any time. The solution is available at:

Main benefits of Panda GateDefender Performa eSeries include:

  • Flexible, cloud-based management to centrally monitor, manage and update appliances quickly and easily, anywhere, anytime.
  • Increased user productivity and optimized resource usage thanks to spam neutralization, restricted access to unproductive content and services, and bandwidth usage control.
  • Complete protection against all types of infections and intrusion attempts right from the start. Faster response to new malware threats via automatic updates and queries to the cloud.
  • High Internet availability and its routing policies allow configuration of multiple high-availability lines, as well as installation of multiple appliances in parallel to deliver fault-tolerant, secure connectivity.
  • Flexible, seamless integration with existing IT infrastructures thanks to the wide range of available versions: hardware, virtual and software appliances.

The new Panda GateDefender Performa eSeries manages companies' perimeter security needs by neutralizing viruses, spam and unauthorized access at the Internet gateway through a complete set of resources which leverage Collective Intelligence technologies. Its main features include:

  • Firewall: Ensures that inbound and outbound communications comply with the security policy.
  • Intrusion prevention system (IPS): Prevents intrusion attacks.
  • Anti-malware: Protects against all types of malicious software in email and Web traffic.
  • Content filter: Scans inbound and outbound traffic for dangerous content.
  • Anti-spam: Keeps email traffic free from junk mail.
  • Web filter: Restricts access to non-work-related Web content.
  • Multiple connection technologies to access the Internet and the corporate network. Compatible with ADSL/UMTS/GPRS/3G/USB devices.
  • VPN: Secure communication with remote offices and roaming workers with mobile devices.
  • HotSpot: Grants controlled temporary Internet access to guests or visitors to the company.
  • QoS: Minimizes unproductive and ineffective usage of precious network bandwidth.

For more information about Panda GateDefender Performa eSeries, please visit

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Security collaborates with WWF and Project Stella as part of its Corporate Social Responsibility policy.

For more information, visit

SOURCE Panda Security

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers